wiby  
Settings



[stw]

http://webarchive.me/geocities/SiliconValley/Circuit/1924/

are of interest to old hackers as well as newbies. The general section includes philez that describe our culture and the section regarding the law include articles that will make
The best underground hackintosh software around.

The 2006 Linux Filesystems Workshop (Part II) [LWN.net]

https://lwn.net/Articles/190223/

and all around Linux hacker Andreas Dilger, Cluster File Systems - Lustre developer James Bottomley, SteelEye - Linux SCSI maintainer Chris Mason, SuSE - Reiserfs developer Christ
[Editor's note: this is the second page of Valerie Henson's report from 2006 Linux Filesystems [...]

Activism: Cypherpunks

https://www.activism.net/cypherpunk/

Ban Spam Cryptography Hackers Information Consulting Hacking Anonymizers Remailers Publishing Social Technical Algorithms Documentation Protocols Other Stuff Hackers People Transi

The Jargon File

http://catb.org/jargon/html/

File I. Introduction 1. Hacker Slang and Hacker Culture 2. Of Slang, Jargon, and Techspeak 3. Revision History 4. Jargon Construction Verb Doubling Soundalike Slang The -P Convent

UTF-8.jp

https://utf-8.jp/

Web site http://openmya.hacker.jp/hasegawa/

NEW! - MaxALERT Reimagined!

https://tmafe.com/maxalert

late breaking virus and hacker news right to your desktop! His goal in life is to protect you! Plus, he can even talk, fly, browse and search like no other friend you've ever had!
Welcome to the world of MaxALERT Reimagined! He will deliver late breaking virus and hacker news right to your desktop! His goal in life is to protect you! Plus, he can even talk,

“Wolf” narrative considered harmful (also biologically unlikely) | Kellan Elliott-McCrea: Blog

https://laughingmeme.org/2014/09/02/wolf-narrative-considered-harmful-also-biologically-unlikely/

Full Stack Product Hacker . Kellan Elliott-McCrea kellan@gmail.com On Mastodon: @kellan kellan kellan kellan kellanem Leadership blog A personal blog of Kellan Elliott-McCrea. I d
Rands’ “The Wolf” post floated across my Twitters this morning. My immediate reaction was that it was misguided to the point of being potentially harmful. That was 16 long ho

Bostjan Grandovec - News

http://bostjan-grandovec.si/Content/News.htm

1-3, Grand Prix Tennis, Hacker, Ian's Night Out, Into Africa, JetSet Willy, Knight Rider, Komplex. Read more... 25.04.2022    Pantheon 11.296 Sinclair ZX80/81 emulator n

What Startups Are Really Like

https://paulgraham.com/really.html

strategic insight. Most hacker-founders would like to spend all their time programming.You won't get to, unless you fail. Which can be transformed into:If you spend all your time

The LAGenWeb Project -- Louisiana USGenWeb

http://www.lagenweb.net/

July 25 by a Russian hacker (MAViDENiZ) who does things like this for fun. I will try to have the site back up and updated over the week end when I have access to a high-speed con
The LAGenWeb Project is the Louisiana genealogy project for USGenWeb. Free genealogy research help to anyone with internet access...that's what we do.

All Episodes | Lateral with Tom Scott

https://lateralcast.com/episodes/

opposites. 51: Snap! Hacker! Pop! Toby Hendy, Matthew Schuchman and Julian O'Shea face questions about superlative streets, marine mutinies and blacked-out books. 50: Undercover s
A podcast about interesting quiz questions, and even more interesting answers, hosted by Tom Scott.

Protocol ForHonest Elections

http://www.thelandesreport.com/ProtocolForHonestElections.htm

inside (or an outside hacker) has to do is rig the election by a lot. And audits of election results are often not sufficient to uncover vote manipulation.  But vote fraud is
Democracy demands transparency, not trust. Voting by machine, computer, early, mail, harvest, drop box and other nontransparent methods consituties 'de facto' fraud as it is impo


Find more...